Efficient Routing in Manets that Takes into Account Dropped Packets in Order to Conserve Energy
Keywords:MANETs, Security, energy, routing, Packet dropping
Mobile ad hoc networks are wireless networks that do not have a central server but instead function as a dispersed, multi-hop system. These networks are also known as mesh networks. MANETs are distinct from typical networks in several important respects, including the absence of a centralized coordinator, the dynamic nature of the network design, and the restricted access to network resources. MANETs can communicate thanks to a wireless radio transmission; nevertheless, because these networks are not physically secured, security measures can be implemented on them. In addition, because peer-to-peer networks are decentralized, they are an easy target for malicious actors that use the internet. As a result, a security solution is necessary to cope with the numerous attacks that may be launched against MANETs. It is difficult to maintain the batteries of MANET nodes charged while they are being used since the nodes themselves have restricted access to energy supplies. Therefore, giving energy efficiency together with security is a significant necessity in a distributed environment; numerous energy-efficient protocols and security protocols have been devised for MANETs, but these approaches are not ideal for the mission-critical applications that run on MANETs. Therefore, we want a unified solution that is capable of simultaneously satisfying our requirements for energy and security. It is difficult to establish the best secure and efficient way of routing between the source and the destination since there is no infrastructure, the network is peer-to-peer, and there are resource limits. When it comes to MANETs, we demonstrate that energy efficiency is just as crucial as secure routing, and we analyze the most recent research that has been conducted on the subject. The bottleneck that is generated by rejecting packets at the intermediate node is one of the issues that must be addressed when creating a system to handle this issue. The other obstacle is the lack of confidence in security solutions provided by third parties. As a result, we proposed a safe and energy-efficient routing protocol as a means of effectively mitigating harmful behaviors at the routing layer by carefully considering the factors that contribute to packet loss. The authentication that is offered by the approach that we have developed makes use of chaotic maps, which are far easier to calculate than RSA and ECC, both of which may be solved in polynomial time with the assistance of an advisor.
Sana, Afreen Begum, Farheen Iqbal, and Arshad Ahmad Khan Mohammad. "Quality of service routing for multipath manets." In 2015 International Conference on Signal Processing and Communication Engineering Systems, pp. 426-431. IEEE, 2015.
Siddiqua, Ayesha, Kotari Sridevi, and Arshad Ahmad Khan Mohammed. "Preventing black hole attacks in MANETs using secure knowledge algorithm." 2015 International Conference on Signal Processing and Communication Engineering Systems. IEEE, 2015.
Sultana, Towheed, Arshad Ahmad Khan Mohammad, and Nikhil Gupta. "Importance of the Considering Bottleneck Intermediate Node During the Intrusion Detection in MANET." In Research in Intelligent and Computing in Engineering, pp. 205-213. Springer, Singapore, 2021.
Mohammad, Arshad Ahmad Khan, Ali Mirza Mahmood, and Srikanth Vemuru. "Intentional and unintentional misbehaving node detection and prevention in mobile ad hoc network." International Journal of Hybrid Intelligence 1, no. 2-3 (2019): 239-267.
Mohammad, Arshad Ahmad Khan, Ali Mirza Mahmood, and Srikanth Vemuru. "Energy-Aware Reliable Routing by Considering Current Residual Condition of Nodes in MANETs." In Soft Computing in Data Analytics, pp. 441-452. Springer, Singapore, 2019.
Mohammad, Arshad Ahmad Khan, Ali Mirza, and Srikanth Vemuru. "Cluster based mutual authenticated key agreement based on chaotic maps for mobile ad hoc networks." Indian Journal of Science and Technology 9 (2016): 26.
Mohammad, Arshad Ahmad Khan, Ali Mirza, and Mohammed Abdul Razzak. "Reactive energy aware routing selection based on knapsack algorithm (RER-SK)." In Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2, pp. 289-298. Springer, Cham, 2015.
Mohammad, Arshad Ahmad Khan, Ali Mirza, and Srikanth Vemuru. "Analytical Model for Evaluating the Bottleneck Node in MANETs." Indian Journal of Science and Technology 9 (2016): 31.
Mohammad, Arshad Ahmad Khan, Ali Mirza, and Srikanth Vemuru. "Energy aware routing for manets based on current processing state of nodes." Journal of Theoretical and Applied Information Technology 91, no. 2 (2016): 340.
Abdul, Arif Mohammad, Arshad Ahmad Khan Mohammad, P. Venkat Reddy, Praveena Nuthakki, Rakesh Kancharla, Rahul Joshi, and N. Kannaiya Raja. "Enhancing Security of Mobile Cloud Computing by Trust-and Role-Based Access Control." Scientific Programming (2022).
Mohammad, Arshad Ahmad Khan, Et Al. "Efficient Mobile Sink Location Placement By Residual Status In WSN To Enhance The Network Lifetime." Journal of Engineering Science and Technology 16.6 (2021): 4779-4790.
Sastry, M. Kiran, Arshad Ahmad Khan Mohammad, and Mohammad Abdul Arif. "Optimized Energy-efficient Load Balance Routing Protocol for Wireless Mesh Networks." International Journal of Advanced Computer Science and Applications 12.8 (2021).
Arshad Ahmad Khan Mohammad, Towheed Sultana” Evaluation Of Performance Degradation Due To The Presence Of Bottleneck Intermediate Node In Communication Path In Manet” International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249-8958 (Online), Volume-8 Issue-4, April 2019
Mohammad Mohammad, Aleem Mohammed and C Atheeq, “Prior Bush Fire Identification Mechanism Based on Machine Learning Algorithms” International Journal of Artificial Intelligence and Applications, Vol.13, No.4, July 2022
C Atheeq, M Munir Ahamed Rabbani, “CACK—A Counter Based Authenticated ACK to Mitigate Misbehaving Nodes from MANETs” Recent Advances in Computer Science and Communications 12, 2021.
C Atheeq, M Munir Ahamed Rabbani, “Secure Data transmission in integrated internet MANETs based on effective trusted knowledge algorithm” Indian Journal of Science and Technology. Vol. 9 No. 47, Dec 2016
C. Atheeq, Ahamed Rabbani, “Secure Intelligence Algorithm for data transmission in Integrated Internet MANET” International Journal of Computer Science and Applications, Vol. 14, No. 2, pp. 142 – 163, 2017
Mohapatra, S. K. ., Patnaik, S. ., & Kumar Mohapatra, S. . (2023). An Enhanced Automated Epileptic Seizure Detection Using ANFIS, FFA and EPSO Algorithms . International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 57–67. https://doi.org/10.17762/ijritcc.v11i4s.6307
Diksha Siddhamshittiwar. (2017). An Efficient Power Optimized 32 bit BCD Adder Using Multi-Channel Technique. International Journal of New Practices in Management and Engineering, 6(02), 07 - 12. https://doi.org/10.17762/ijnpme.v6i02.57
Dhabliya, D., Sharma, R. Cloud computing based mobile devices for distributed computing (2019) International Journal of Control and Automation, 12 (6 Special Issue), pp. 1-4.
How to Cite
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.